What happens when you experience a breach | Ep 25

Updated on August 22, 2023

No software company wants to experience a security breach. But they can happen in today’s digital world. That’s why managing risk goes hand-in-hand with having Embedded Payments as part of your software platform.

In this episode of PayFAQ: The Embedded Payments Podcast, Jessica Kirkpatrick, Senior Director of Risk, Fraud, and Underwriting at Payrix shares how software companies can detect security comprises early, contain breaches if they occur, and help prevent them from happening in the first place.

Jessica draws from 18 years of experience in the payments industry, including 17 years in risk operations at PayPal. She tells our host Bob Butler that many companies don’t find out about security breaches until they hear from customers when the damage is done, such as they’re no longer receiving funds or seeing unrecognized activity on their software account. The impact can be costly for the merchant and the software company.

At that point, she emphasizes how important it is for companies to contain the breach and prevent further compromise and damage. Implementing measures like changing passwords, multifactor authentication, and conducting a thorough investigation are crucial steps to take immediately.

The biggest mistake is doing nothing or believing you’ve fully mitigated the attack. According to Jessica, if a fraudster detects vulnerability, they’ll come back and try again. She explains the very first thing to do to prevent future attacks is managing access to your software. Then, focus should be on training employees and merchants, developing a robust cyber-security policy, and other measures that together help prevent future breaches.

Have a listen and stay safe!

  • Transcript

    Bob Butler

    Hi everyone. Welcome to the PayFAQ Embedded Payments podcast brought to you by Payrix. I’m your host Bob Butler and today I’m going to be speaking with Jessica Kirkpatrick.  She’s our Senior Director of Risk, Fraud, and Underwriting and we’re going to be talking about what happens if you have a security breach. So hi Jessica, welcome to the show.

    Jessica Kirkpatrick

    Hi Bob, thanks for having me.

    Bob Butler

    It’s great to have you here, but before we get started. Can you tell our audience a little bit about yourself and your software and payments background?

    Jessica Kirkpatrick

    Sure, so I am located in Omaha, Nebraska right in the middle of the country. I have been in payments for 18 years, the first seventeen years of that was with PayPal and the last year has been here at Payrix. All of my time and payments have been in fraud to some capacity.

    Bob Butler

    We know no one wants to experience a security breach, but it can happen in our digital world today. Before we get into what happens after the breach, can you talk a little bit about how a software company might detect a security compromise.

    Jessica Kirkpatrick

    Oh yeah, for sure, if monitoring and controls are in place and the company is actively monitoring customer behavior, a breach can be detected early which will limit the impact – looking at suspicious network activity like strange file transfers or login attempts, sudden changes to critical infrastructure, or system passwords and accounts, suspicious files in the system which may or may not have been encrypted, suspicious banking activities and transactions. All of these can bring awareness around an event as it’s actually happening. Too often though, software companies become aware of a breach when the company receives notice from their customers that they are no longer receiving their funds or they’re seeing unrecognized activity on their software account like bank account changes or contact information changes. When this happens the impact can be costly for the merchant and the software company who now have to repair their own brand reputation.

    Bob Butler

    So once a breach is identified. What should a software company do first?

    Jessica Kirkpatrick

    Well first of all, business operations are going to be heavily disrupted in the aftermath of a breach. Organizations need to be able to contain that data breach and conduct a thorough investigation into how it occurred and what systems were accessed. The very first thing that these software companies should do is to contain the breach and to do that they’re going to prevent any further compromise of personal information. Changing passwords for both the software companies and all of their merchants and their portfolios and implementing multifactor authentication is going to be key at this very first stage.

    Bob Butler

    Once they’ve taken those steps, what comes next? Can you talk a bit about the aftermath?

    Jessica Kirkpatrick

    Assess the data breach by gathering the facts and evaluating the risk including potential harm to affected  individuals and, where possible, taking action to remediate any risk of harm. They need to notify individuals who are impacted by the breach. And then review the incident and consider what actions can be taken to prevent future breaches.

    Bob Butler

    So we’ve got a breach. What are the biggest mistakes a software company can make once they have this breach?

    Jessica Kirkpatrick

    First and foremost, the biggest mistake they can do, is do nothing. I would say in addition, believing that they have fully mitigated the attack and washed their hands on it. Like going into the state of ignorance. So if a fraudster detects a vulnerability, they will come back and try again. Education is key and developing a robust education program that stays on top and up to date with the latest fraud trends will inform the employees of the company and make them aware of what they can be identified to prevent future breaches.

    Bob Butler

    So, after the software companies handled the breach. What should the ongoing plan look like for the future?

    Jessica Kirkpatrick

    First of all, they need to manage access. This goes back to that multi-factor authentication that we talked about before. White listing Ips, controlling and monitoring access for anyone who connects to the system. Create multiple level approval floors and review permissions regularly. Going back to educating employees and merchants and establishing a robust cyber-security policy informing the team to avoid unfamiliar websites and downloads. Training employees on various cyber-security events such as clickjacking and phishing attempts and then run campaigns regularly. Avoid unfamiliar websites and useless downloads. Even those that appear to be from an internal or reputable source. And really one of the most important things is keeping the systems up to date. Use your firewalls, Antivirus Protection, Wifi network security, invest in patch management systems, configure automated updates to browsers, software’s, operating systems, and using VPN if you’re on a on public wi-fi. All of these things together help ensure that the software company is not putting themselves at risk for future breach.

    Bob Butler

    This has been fantastic, Jessica. Any last pieces of advice you’d like to leave for a software company?

    Jessica Kirkpatrick

    I think really the most important thing I could say is educate and check and recheck. Always go back and complete that circle.

    Bob Butler

    Excellent. So, Jessica thank you for being on the show. Having spent quite a bit of time with you over the last few months, now it’s coming up on a couple of years, I know we’re both big believers in sharing knowledge and experience. So, we really appreciate you joining us today.

    Jessica Kirkpatrick

    Thank you, Bob.

    Bob Butler

    We want to be a trusted resource for software providers who are out there trying to make sense of Embedded Payments and finance, and to help them get the education they need to make the business decisions their customers and investors will thank them for.

Payment experiences designed for your software

Unleash powerful Embedded Payments technology that delivers on a better experience.